封面
版权页
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. The Foundations and Principles of Digital Forensics
What is digital crime?
Digital forensics
Digital evidence
Digital forensic goals
Analysis approaches
Summary
Chapter 2. Incident Response and Live Analysis
Personal skills
Security fundamentals
The hardware for IR and Jump Bag
Remote live response
Summary
Chapter 3. Volatile Data Collection
Memory acquisition
Network-based data collection
Summary
Chapter 4. Nonvolatile Data Acquisition
Forensic image
Incident Response CDs
Live imaging of a hard drive
Linux for the imaging of a hard drive
Virtualization in data acquisition
Evidence integrity (the hash function)
Disk wiping in Linux
Summary
Chapter 5. Timeline
Timeline introduction
The Sleuth Kit
Super timeline – Plaso
Plaso architecture
Plaso in practice
Summary
Chapter 6. Filesystem Analysis and Data Recovery
Hard drive structure
The FAT filesystem
The NTFS filesystem
The Sleuth Kit (TSK)
Autopsy
Foremost
Summary
Chapter 7. Registry Analysis
The registry structure
Backing up the registry files
Extracting registry hives
Parsing registry files
Auto-run keys
Registry analysis
Summary
Chapter 8. Event Log Analysis
Event Logs - an introduction
Event Logs system
Extracting Event Logs
Summary
Chapter 9. Windows Files
Windows prefetch files
Windows tasks
Windows Thumbs DB
Windows RecycleBin
Windows shortcut files
Summary
Chapter 10. Browser and E-mail Investigation
Browser investigation
Microsoft Internet Explorer
Firefox
Other browsers
E-mail investigation
Summary
Chapter 11. Memory Forensics
Memory structure
Memory acquisition
The sources of memory dump
Processes in memory
Network connections in memory
The DLL injection
API hooking
Memory analysis
Summary
Chapter 12. Network Forensics
Network data collection
Exploring logs
Using tcpdump
Using tshark
Using WireShark
Knowing Bro
Summary
Appendix appA. Building a Forensic Analysis Environment
Factors that need to be considered
Appendix appB. Case Study
Introduction
Scenario
Acquisition
Live analysis
Prefetch files
Browser analysis
Postmortem analysis
Summary
更新时间:2021-07-14 11:28:37